JDMurray wrote: » Does anyone have a good methodology for threat hunting? You can't just randomly poke around a network's syslogs and Netflows and expect to find truly suspicious activity with any great efficiency. I am wondering what others use as their threat hunting recommended procedures or best-practices.
JDMurray wrote: » Is there any differentiation between (pseudo) real-time hunting using Netflows and packet caps and sometime-after-the-fact event hunting using logged events? Having a SIEM look for account lockout events in syslog messages isn't what I think of as "threat hunting." To me, "hunting" is a human looking for things happening now--either evidence of active intrusions (e.g., scanning or failed logins happening now) or remaining evidence of past intrusions (e.g., suspicious files or connections left established between hosts). I'm wondering where people draw the line between "threat hunting" and business-as-usual security monitoring. There are some good resources posted to this thread. I'll see what I can dig up to help the_Grinch decided on his thesis topic.